-
1
-
-
33644608852
-
Data security and cryptographic techniques: A review
-
Rabah, K., 2004. Data security and cryptographic techniques: A review. ITJ., 3: 106-132.
-
(2004)
ITJ.
, vol.3
, pp. 106-132
-
-
Rabah, K.1
-
3
-
-
0003614758
-
Digital signature and public-key functions as intractable as factorization
-
Rabin, M.O., 1979. Digital signature and public-key functions as intractable as factorization. MIT Laboratory of Computer Science, Technical Report, MIT/LCS/TR-212.
-
(1979)
MIT Laboratory of Computer Science, Technical Report
, vol.MIT-LCS-TR-212
-
-
Rabin, M.O.1
-
4
-
-
0017930809
-
A method for obtaining digital signatures and public key cryptosystems
-
Rivest, R., A. Shamir and L. Adleman, 1978. A method for obtaining digital signatures and public key cryptosystems. Comm. ACM., 21: 120-126.
-
(1978)
Comm. ACM.
, vol.21
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
6
-
-
84968503742
-
Elliptic curve cryptosystems
-
Koblitz, N., 1987. Elliptic curve cryptosystems. Mathematics of Computation, 48: 203-209.
-
(1987)
Mathematics of Computation
, vol.48
, pp. 203-209
-
-
Koblitz, N.1
-
7
-
-
85015402934
-
Use of elliptic curves in cryptography
-
Miller, V., 1986. Use of elliptic curves in cryptography. In: CRYPTO '85, pp: 417-426.
-
(1986)
CRYPTO '85
, pp. 417-426
-
-
Miller, V.1
-
8
-
-
33644596644
-
Theory and implementation of elliptic curve cryptography
-
Rabah, K., 2005. Theory and implementation of elliptic curve cryptography. J. Applied Sci., 5: 604-633.
-
(2005)
J. Applied Sci.
, vol.5
, pp. 604-633
-
-
Rabah, K.1
-
12
-
-
33644603483
-
-
IEEE P1363a: http://grouper.ieee.org/groups/1363/P1363a/
-
-
-
-
14
-
-
33644591550
-
Implementation of elliptic curve diffie-hellman and EC encryption schemes
-
Rabah, K., 2005. Implementation of elliptic curve diffie-hellman and EC encryption schemes. ITJ., 4: 132-139.
-
(2005)
ITJ.
, vol.4
, pp. 132-139
-
-
Rabah, K.1
-
18
-
-
33644596307
-
-
ISO/IEC: http://grouper.ieee.org/groups/1363/Research/Other.html
-
-
-
-
21
-
-
84957657892
-
Fast key exchange with elliptic curve systems
-
Advances in Cryptology-Crypto '95, Springer-Verlag
-
Schroeppel, R., H. Orman, S. O'Malley and O. Spatscheck, 1995. Fast Key Exchange with Elliptic Curve Systems. Advances in Cryptology-Crypto '95, LNCS 963, Springer-Verlag, pp: 43-56.
-
(1995)
LNCS
, vol.963
, pp. 43-56
-
-
Schroeppel, R.1
Orman, H.2
O'Malley, S.3
Spatscheck, O.4
-
22
-
-
3242714854
-
A low-power design for an elliptic curve digital signature chip
-
Schroeppel, R., C. Beaver, R. Gonzales, R. Miller and T. Draelos, 2002. A low-power design for an elliptic curve digital signature chip. Presented at Cryptographic Hardware and Embedded Systems (CHES).
-
(2002)
Presented at Cryptographic Hardware and Embedded Systems (CHES)
-
-
Schroeppel, R.1
Beaver, C.2
Gonzales, R.3
Miller, R.4
Draelos, T.5
-
23
-
-
84955600081
-
n)
-
Advances in Cryptology-ASIACRYPT '96, Springer-Verlag
-
n). Advances in Cryptology-ASIACRYPT '96, LNCS 1163, Springer-Verlag, pp: 65-76.
-
(1996)
LNCS
, vol.1163
, pp. 65-76
-
-
De Win, E.1
Bosselaers, A.2
Vandenberghe, S.3
De Gersem, P.4
Vandewalle, J.5
-
24
-
-
0000010648
-
Selecting cryptographic key sizes
-
Imai, H. and Y. Zheng, Eds., Berlin, Springer-Verlag
-
Lenstra, A. and E. Verheul, 2000. Selecting Cryptographic Key Sizes. In: Imai, H. and Y. Zheng, Eds., PKC 2000, volume LNCS 1751, Berlin, Springer-Verlag.
-
(2000)
PKC 2000
, vol.LNCS 1751
-
-
Lenstra, A.1
Verheul, E.2
-
25
-
-
0001224411
-
Efficient arithmetic in finite field extensions with application in elliptic curve cryptography
-
Bailey, D. and C. Paar, 2001. Efficient arithmetic in finite field extensions with application in elliptic curve cryptography. J. Cryptol., Vol: 14.
-
(2001)
J. Cryptol.
, vol.14
-
-
Bailey, D.1
Paar, C.2
-
26
-
-
0004742708
-
Elliptic curve cryptography on smart cards without coprocessors
-
Bristol, UK, September 20th, Kluwer
-
Woodbury, A., D.V. Bailey and C. Paar, 2002. Elliptic Curve Cryptography on Smart Cards Without Coprocessors. In: CARDIS 2000, Bristol, UK, September 20th, Kluwer.
-
(2002)
CARDIS 2000
-
-
Woodbury, A.1
Bailey, D.V.2
Paar, C.3
-
27
-
-
84955587760
-
Non-supersingular elliptic curves for public key cryptosystems
-
Advances in Cryptology-Eurocrypt '91, Brighton, United Kingdom, Davies, D.W. (Ed.), Springer-Verlag
-
Beth, T. and F. Schaefer, 1991. Non-Supersingular Elliptic Curves for Public Key Cryptosystems. LNCS 547, Advances in Cryptology-Eurocrypt '91, Brighton, United Kingdom, Davies, D.W. (Ed.), Springer-Verlag, pp: 252-266.
-
(1991)
LNCS
, vol.547
, pp. 252-266
-
-
Beth, T.1
Schaefer, F.2
-
29
-
-
0006423786
-
Low Complexity Bit-parallel Finite Field Arithmetic Using Polynomial Basis
-
Koc, C. and C. Paar, Eds. Springer-Verlag
-
Wu, H., 1999. Low Complexity Bit-parallel Finite Field Arithmetic Using Polynomial Basis. In: Koc, C. and C. Paar, Eds., Workshop on Cryptographic Hardware and Embedded Systems (CHES '99), volume LNCS 1717. Springer-Verlag.
-
(1999)
Workshop on Cryptographic Hardware and Embedded Systems (CHES '99)
, vol.LNCS 1717
-
-
Wu, H.1
-
30
-
-
0033204715
-
Fast arithmetic for public-key algorithms in galois fields with composite exponents
-
Paar, C., P. Fleischmann and P. Soria-Rodriguez, 1999. Fast arithmetic for public-key algorithms in galois fields with composite exponents. IEEE Trans. Computers, 48: 1025-1034.
-
(1999)
IEEE Trans. Computers
, vol.48
, pp. 1025-1034
-
-
Paar, C.1
Fleischmann, P.2
Soria-Rodriguez, P.3
-
31
-
-
0033689021
-
m) and its applications in cryptographic systems
-
m) and its applications in cryptographic systems. Elect. Lett., 36: 1116-1117.
-
(2000)
Elect. Lett.
, vol.36
, pp. 1116-1117
-
-
Orlando, G.1
Paar, C.2
-
34
-
-
85009967725
-
Constructing elliptic curves with given group order over large finite fields
-
Algorithmic Number Theory, The 1st Intl. Symposium, ANTS-I, Ithaca, Springer-Verlag
-
Georg-Johann, L. and Z. Horst-Günter, 1994. Constructing Elliptic Curves with given Group Order over Large Finite Fields. LNCS 877, Algorithmic Number Theory, The 1st Intl. Symposium, ANTS-I, Ithaca, Springer-Verlag, pp: 250-263.
-
(1994)
LNCS
, vol.877
, pp. 250-263
-
-
Georg-Johann, L.1
Horst-Günter, Z.2
-
35
-
-
33644604523
-
-
Research Manuscript, Hewlett-Packard Laboratories
-
m). Research Manuscript, Hewlett-Packard Laboratories.
-
(1998)
m)
-
-
Seroussi, G.1
-
36
-
-
84968486049
-
Primitive normal basis for finite fields
-
Lenstra, H.W.Jr. and R. Schoof, 1987. Primitive normal basis for finite fields. Math. Comput., 48: 217-231.
-
(1987)
Math. Comput.
, vol.48
, pp. 217-231
-
-
Lenstra Jr., H.W.1
Schoof, R.2
-
42
-
-
84966238549
-
Monte Carlo methods for index computation (mod p)
-
Pollard, J.M., 1978. Monte Carlo methods for index computation (mod p). Math. Comput., 32: 918-924.
-
(1978)
Math. Comput.
, vol.32
, pp. 918-924
-
-
Pollard, J.M.1
-
44
-
-
84958601057
-
A key recovery attack on discrete log-based schemes using a prime order subgroup
-
Advances in Cryptology-Crypto '97
-
Lim, C. and P. Lee, 1997. A key recovery attack on discrete log-based schemes using a prime order subgroup. Advances in Cryptology-Crypto '97, Lecture Notes in Computer Science, 1294: 249-263.
-
(1997)
Lecture Notes in Computer Science
, vol.1294
, pp. 249-263
-
-
Lim, C.1
Lee, P.2
-
45
-
-
85029478766
-
New public-key scheme based on elliptic curves over the Ring Zn
-
Advances in Cryptology-Crypto '91, Barbara, S. and J. Feigenbaum (Eds.), Springer-Verlag, California
-
Koyama, K., U.M. Maurer, T. Okamoto and S.A. Vanstone, 1992. New Public-key Scheme Based on Elliptic Curves over the Ring Zn. LNCS 576, Advances in Cryptology-Crypto '91, Barbara, S. and J. Feigenbaum (Eds.), Springer-Verlag, California, pp: 252-266.
-
(1992)
LNCS
, vol.576
, pp. 252-266
-
-
Koyama, K.1
Maurer, U.M.2
Okamoto, T.3
Vanstone, S.A.4
-
46
-
-
33644583862
-
-
ANSI key schemes FIPS 140-2. http://cio.doe.gov/Publications/profile2000/ Profile2000_AppendixA.htm
-
ANSI Key Schemes FIPS 140-2
-
-
-
47
-
-
85084380393
-
Representation of Elliptic Curve Digital Signature Algorithm (ECDSA) keys and signatures in internet X.509 public-key infrastructure certificates
-
Basham, L., D. Johnson and T. Polk, 1999. Representation of Elliptic Curve Digital Signature Algorithm (ECDSA) keys and signatures in internet X.509 public-key infrastructure certificates. Internet Draft, http://www.ietf.org, pp: 252-266.
-
(1999)
Internet Draft
, pp. 252-266
-
-
Basham, L.1
Johnson, D.2
Polk, T.3
-
48
-
-
84874800178
-
A public-key cryptosystem and a signature scheme based on discrete logarithms
-
ElGamal, T., 1985. A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Infor. Theory, 31: 469-472.
-
(1985)
IEEE Trans. Infor. Theory
, vol.31
, pp. 469-472
-
-
Elgamal, T.1
-
49
-
-
1542593353
-
Authentication and authenticated key exchanges
-
Diffie, W., P.V. Oorschot and M. Wiener, 1992. Authentication and authenticated key exchanges. Designs, Codes and Cryptography, 2: 107-125.
-
(1992)
Designs, Codes and Cryptography
, vol.2
, pp. 107-125
-
-
Diffie, W.1
Oorschot, P.V.2
Wiener, M.3
-
51
-
-
33644600874
-
A parallel galois field multiplier with low complexity based on composite fields
-
Mölle, Sweden
-
Paar, C., 1993. A parallel galois field multiplier with low complexity based on composite fields. 6th Joint Swedish-Russian Workshop on Information Theory, Mölle, Sweden, pp: 320-324.
-
(1993)
6th Joint Swedish-Russian Workshop on Information Theory
, pp. 320-324
-
-
Paar, C.1
|